Sciweavers

1456 search results - page 290 / 292
» Two Techniques to Improve Finite Model Search
Sort
View
ECCV
2010
Springer
14 years 3 months ago
Hough Transform and 3D SURF for robust three dimensional classification
Most methods for the recognition of shape classes from 3D datasets focus on classifying clean, often manually generated models. However, 3D shapes obtained through acquisition tech...
RANDOM
1998
Springer
14 years 3 months ago
Using Approximation Hardness to Achieve Dependable Computation
Abstract. Redundancy has been utilized to achieve fault tolerant computation and to achieve reliable communication in networks of processors. These techniques can only be extended ...
Mike Burmester, Yvo Desmedt, Yongge Wang
ATAL
2008
Springer
14 years 23 days ago
GS3 and Tartanian: game theory-based heads-up limit and no-limit Texas Hold'em poker-playing programs
We demonstrate two game theory-based programs for headsup limit and no-limit Texas Hold'em poker. The first player, GS3, is designed for playing limit Texas Hold'em, in ...
Andrew Gilpin, Tuomas Sandholm, Troels Bjerre S&os...
CSCW
2008
ACM
14 years 16 days ago
Understanding the implications of social translucence for systems supporting communication at work
In this paper we describe a study that explored the implications of the Social Translucence framework for designing systems that support communications at work. Two systems design...
Agnieszka Matysiak Szóstek, Evangelos Karap...
SP
2008
IEEE
120views Security Privacy» more  SP 2008»
13 years 10 months ago
Pacemakers and Implantable Cardiac Defibrillators: Software Radio Attacks and Zero-Power Defenses
Abstract--Our study analyzes the security and privacy properties of an implantable cardioverter defibrillator (ICD). Introduced to the U.S. market in 2003, this model of ICD includ...
Daniel Halperin, Thomas S. Heydt-Benjamin, Benjami...